Which of these terms is not a type of cyber phishing A Smishing, B Wishing, C Quishing, D Vishing,Ephishing
wishing
What is the first thing you should do if you are a victim of a cyber attack
type of Malware that with pop-ups
adware
Malicious programs that want money from their victims by blocking access to the computer until the victim pays.
Ransomeware
all the passwords must be changed at least on a what basis
Quarterly basis
A type of Malware, that disguises itself as a normal program
Trojan
what does the acronym OTP stand? A Over the Password, B One Touch Password, C One Time Password, D Operator Training Password
One Touch Password
What is the simplest way to stop cyberattacks
Add a few unique characters to any password
An attack that is designed to stop normal functioning of a website. A poofing, B DoS Attack, C POS Attack, D Hoak
DoS Attack
a person allows themselves to be identified as someone else by faking data? A Virus, B Spoof, C Malware, D Spam
spoof
Employing a what trust strategy means that every user user has to be authenticated no matter what A Encrypted, B MFA ,C Zero
zero
Viruses, worms, bots, phishing and the like in context of computers are examples of
malware
Social what is the name of the cybersecurity threat where they trick others into revealing sensitive information. A Hacking, B Engineering,C Phishing, D Scamming
Engineering
what should any good password not include
personal data
what malware type allows the attacker to access the administrative controls
Remote Access Trojans